Posts

Posts

typenameratingauthorhiveactivity
blog entryNominate an outstanding new researcher!0788Gia M ChevisThe Forum--The Blog of the International SectionpublicSeptember 2, 2016
blog entryJIS Conference 20160290JISC2016 Invitation.pdfRoger DebrecenyJIS Senior Editors' BlogpublicAugust 26, 2016
blog entryIn a sea of Big Data, what becomes of accounting and...0866Roger S DebrecenyJIS Senior Editors' BlogpublicMarch 23, 2016
blog entryForthcoming paper: Valuing Personal Data to Foster Privacy:...0196Roger S DebrecenyJIS Senior Editors' BlogpublicMarch 23, 2016
blog entryForthcoming paper: Repairing Organizational Legitimacy...0243Roger S DebrecenyJIS Senior Editors' BlogpublicMarch 23, 2016
blog entryForthcoming paper: Blogs as Research and Teaching Resources...2399Roger S DebrecenyJIS Senior Editors' BlogpublicSeptember 12, 2018
blog entryForthcoming paper: The Effect of Frequency and Automation of...0387Roger S DebrecenyJIS Senior Editors' BlogpublicMarch 18, 2016
blog entryOverview of JIS paper: The effects of information...0248Roger S DebrecenyJIS Senior Editors' BlogpublicMarch 9, 2016
blog entryOverview of Theme Issue on Enterprise Ontologies0197Roger S DebrecenyJIS Senior Editors' BlogpublicMarch 6, 2016
blog entryHere's to a successful #iasmidyear20160937Gia M ChevisThe Forum--The Blog of the International SectionpublicFebruary 26, 2016
blog entryA new paper in JIS - Reporting Frequency and Presentation...0169Roger S DebrecenyJIS Senior Editors' BlogpublicFebruary 26, 2016
blog entryOverview of JIS Paper. A Method to Evaluate Information...0136Roger S DebrecenyJIS Senior Editors' BlogpublicFebruary 26, 2016
blog entryOverview of JIS paper: IT Governance and the Maturity of IT...0289Roger S DebrecenyJIS Senior Editors' BlogpublicFebruary 26, 2016
blog entryOverview of JIS paper: The Relationship Between Board-Level...0158Roger S DebrecenyJIS Senior Editors' BlogpublicFebruary 26, 2016
blog entryOverview of JIS paper: SECURQUAL: An Instrument for...0153Roger S DebrecenyJIS Senior Editors' BlogpublicFebruary 26, 2016
blog entryOverview of JIS paper: Applying Basic Gamification...0200Roger S DebrecenyJIS Senior Editors' BlogpublicFebruary 26, 2016
blog entryJournal of Information Systems Conference 20160444Roger S DebrecenyJIS Senior Editors' BlogpublicFebruary 4, 2016
blog entryRemarks by Senior Editor, Mary Curtis, at the 2015 AAA...0390Roger S DebrecenyJIS Senior Editors' BlogpublicJanuary 27, 2016
blog entryDark Side of the Internet: Students can find almost...1498Richard E LillieTeaching with Technology > TwTpublicJanuary 15, 2016
blog entry2015 Survey of Faculty Attitudes on Technology0262Richard E LillieTeaching with Technology > TwTpublicOctober 14, 2015
announcementWebinar Series0791AAA HQAccounting IS Big Data (AiBD) > AiBD Conference 2015publicSeptember 25, 2015
resourcePre-conference resources for what are the Research...0522AAA HQAccounting IS Big Data (AiBD) > AiBD Research ResourcespublicSeptember 21, 2015
announcementPre-meeting Resources0623AAA HQAccounting IS Big Data (AiBD) > AiBD Conference 2015publicSeptember 21, 2015
announcement2015 Inaugural Event2965AAA HQAccounting IS Big Data (AiBD) > AiBD Conference 2015publicSeptember 29, 2015
blog entryThe "Book Trilogy" Becomes a "Quartet"0310Richard E LillieTeaching with Technology > TwTpublicSeptember 7, 2015
blog entryIf Content is King, It's Time to Overthrow the Monarchy!0377Richard E LillieTeaching with Technology > TwTpublicApril 24, 2015
blog entrySenior Editors' Update0190Roger S DebrecenyJIS Senior Editors' BlogpublicApril 16, 2015
blog entryTeaching in a Digital Age by A.W. (Tony) Bates --...0347Richard E LillieTeaching with Technology > TwTpublicApril 8, 2015
blog entryPhotos from JISC 20150219Roger S DebrecenyJIS Senior Editors' BlogpublicApril 8, 2015
blog entryCompetency-based education is all the rage: What is it?9911Richard E LillieTeaching with Technology > TwTpublicFebruary 21, 2019